top of page

Related Courses

Build Security Incident Response for GDPR data protection Video Training Course

Build Security Incident Response for GDPR data protection Video Training Course Download

 

Size: 2.96 GB

Duration : 8.22 Hours

 

 

01 Introduction

 

001 Welcome  Intro

002 Set your expectations

003 A 1st touch of what you will really get in the course

003 Data-Privacy-GDPR-CCPA-Learning-Plan-by-Roland-Costea.xlsx

004 1-Udemy-June-Data-Privacy-GDPR-CCPA-Learning-Plan-by-Roland-Costea-v2020-copy.xlsx

004 My first promise to you - get certified in less than 30 days CIPT CIPM CIPPE

005 Powerpoints.zip

005 Presentations (ppt).html

 

02 Incident Response in CyberSecurity

 

006 What is Incident Response and why do I need it

007 Incident Response Team

008 Incident Response Process and Procedures

009 Types of Security Incidents

010 Incident Response Tools - general

011 What is a SIEM

012 Incident Response Training

013 What is automation in incident response

013 security-automation-best-practices.pdf

 

 

03 Building a Security Operations Center (SOC)

 

014 What is a NOC

015 What is a SOC

016 Integrated NOC and SOC

017 Mission Team and Required Training

018 Types of SOC

019 Building a SOC

020 Cheat Sheets to help you in configuring your systems

020 Windows-File-Auditing-Cheat-Sheet-ver-Nov-E7.pdf

020 Windows-Logging-Cheat-Sheet-ver-Oct-E6.pdf

020 Windows-PowerShell-Logging-Cheat-Sheet-ver-Sept-E7-v2.1.pdf

020 Windows-Registry-Auditing-Cheat-Sheet-ver-Nov-E7.pdf

020 Windows-Splunk-Logging-Cheat-Sheet-v2.2.pdf

 

 

04 GDPR and Incident Response

 

021 0-EU-General-Data-Protection-Regulation-E6.pdf

021 GDPR intro

022 GDPR effects on Incident Response

023 How to create an effective IR plan

024 4.4-GDPR-Incident-Response-Process-and-Policy.pdf

024 GDPR Incident Response Process

025 4.5-Defradar-Information-Security-Incident-Response-Procedure.pdf

025 Lets draft the IRM Procedure

025 VISIO-GDPR-Information-Security-Incident-Response-Flowchart-10-30-18.vsd

026 4.6-Defradar-GDPR-EXAMPLE-Personal-Data-Breach-Notification-Form.pdf

026 4.6-Defradar-GDPR-Personal-Data-Breach-Notification-Procedure.pdf

026 How to treat data breaches

 

 

05 GDPR Incident Response Methodologies (IRM)

 

027 IRM-1-WormInfection.pdf

027 IRM1 - Worm Infection

028 IRM-2-WindowsIntrusion.pdf

028 IRM2 - Windows Intrusion

029 IRM-3-UnixLinuxIntrusionDetection.pdf

029 IRM3 - UnixLinux Intrusion Detection

030 IRM-4-DDOS.pdf

030 IRM4 - DDoS

031 IRM-5-MaliciousNetworkBehaviour.pdf

031 IRM5 - Malicious Network Behaviour

032 IRM-6-Website-Defacement.pdf

032 IRM6 - Website Defacement

033 IRM-7-WindowsMalwareDetection.pdf

033 IRM7 - Windows malware detection

034 IRM-8-Blackmail.pdf

034 IRM8 - Blackmail

035 IRM-9-SmartphoneMalware.pdf

035 IRM9 - SmartphoneMalware

036 IRM-10-SocialEngineering.pdf

036 IRM10 - Social Engineering

037 IRM-11-InformationLeakage.pdf

037 IRM11 - Information Leakage

038 IRM-12-InsiderAbuse.pdf

038 IRM12 - Insider Abuse

039 IRM-13-Phishing.pdf

039 IRM13 - Phishing

040 IRM-14-Scam.pdf

040 IRM14 - Scam

041 IRM-15-Ransomware.pdf

041 IRM15 - Ransomware

 

06 Incident Response Tools for GDPR compliance - free vs enterprise

 

042 Lessons learned by working in a SOC

043 A list of open source tools to use

043 Incident-Response-Tools-collection.docx

044 Windows Defender ATP

 

 

 

07 Banking challenges related to cyber risk

 

045 Today Challenges

046 Target and Distribution

047 Attack Methods

048 Infection vectors

049 Targeted attacks against financial institutions

050 Mobile platform and email scams

051 Takedowns and Conclusions

 

 

08 Financial Malware history with examples

 

052 Past 3 decades of malware (part 1)

053 Past 3 decades of malware (part 2)

054 The architecture of financial malware

055 Zeus

056 Zeus GameOver

057 SpyEye

058 IceIX

059 Citadel

060 Carberp

061 Shylock

062 Bugat

063 Dyre

064 Dridex

065 Shifu

066 Tinba

 

 

09 Making a business case for Financial Malware

 

067 Why Fraud Risk Engines fail

068 How to bypass 2 factor authentication (2FA)

069 Fraud Prevention Technology

070 Compliance and Legal Issues

071 Customer impact

072 Selecting the right cybercrime solution

073 Malware detection

074 Malware detection - advanced

075 Malware detection - how technology can help

076 Criminal Detection  Account Takeover

077 What about mobile banking

 

 

10 Some simple hacking attempts - demo

 

078 Lab setup

079 XSRF attack

080 Compromising Public server

081 Break-In Compromising the victim computer

082 Other Web Application Attack Example

083 Locky Ransomware

084 Gathering Info  Exfiltrate

 

11 Conclusion

 

085 Final thoughts and other documents

085 NIST.SP.800-61r2.pdf

086 1-Udemy-June-Data-Privacy-GDPR-CCPA-Learning-Plan-by-Roland-Costea-v2020-copy.xlsx

086 BONUS - Remember my first promise to you - get certified in less than 30 days

Build Security Incident Response for GDPR data protection Video Training Course

SKU: EXT2021-0051
$4.00Price
  • You can Instant Download a PDF file 

    After successful payment , 

    This PDF File Contains Course Download links

    You can Download This Course immediately from click that Links.

bottom of page